1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
3 years ago
6

In many programming environments today, one language translates the programmers' code into a different language before the compu

ter actually executes the code. For instance, the visual programming language Alice translates your instructions into Python, then Python translates the code into machine-readable code. Python, in this situation, also relies on some C/C++ libraries for certain items, including collision detection. In this situation, which is the highest-level language being used?
A. C/C++.
B. Python.
C. Alice.
D. Machine code.
Computers and Technology
1 answer:
lozanna [386]3 years ago
6 0

Answer:

Alice.

Explanation:

Since the first point of code compiling occurs at Alice, Alice is the highest level language used in this situation.

Technically Python is also a high level language. And C/C++ can be seen as middle level languages, since they have less abstracted access to the underlying hardware like memory.

Assembly languages are the lowest level programming languages.

You might be interested in
Before you enter an intersection on a green light make sure
mr Goodwill [35]

Answer:

there is no pedestrians and everyone is stopped at their designated red light

5 0
3 years ago
Read 2 more answers
Can you think of a situation that might create a problem for a website’s security? What could a back-end developer do to prevent
Yuki888 [10]

A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Others are;

  • Lack of authentication in company security.
  • Access control-linked misconfigurations.
  • A Software misconfigurations.

<h3>What could a back-end developer do to prevent this situation from occurring?</h3>
  • Always Encrypt sensitive data:
  • Do not use weak encryption algorithm.

The back end in cyber security is know to be a sort of a kind of a repository of all that entails your web presence and also that of your mobile apps and it is one that makes it to run smoothly.

Hence, A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Learn more about website’s security from

brainly.com/question/10450768

#SPJ1

4 0
2 years ago
The method of transferring data one word at a time from the CPU to a device is called
Y_Kistochka [10]

Bus de datos:Bus de dirección:Bus de control.

8 0
3 years ago
You are the CISO of a company and you need to create logging policies. Please review NIST SP800-92, specifically sections 4–3 th
Kitty [74]

<u>The various systems on a network and develop a logging policy based on the information in the aforementioned sections:</u>

Cisco is router, which is physical device appliance where placed in LAN OR WAN for connecting workstation or desktop or laptop of other offices in organization.

It is a security device and purpose to make organization to access or connected to end use of other networks.

Basically there routers are used ISDN LINE, LEASE LINE or VPN for connecting varies WAN

Purpose of keeping the logging polices to do further analysis how the network packets or traffic is executed and passed different tcpip address. If case any hackers or packet loss the network administrator will do further analysis and protect the system form packet loss or from hackers.  Keeping network logs is policy driven. So network administrator keeps logs for no. of days.

Some network administration export log and keep as reference.

4 0
4 years ago
In what type of attack does the attacker send unauthorized commands directly to a database?
Delvig [45]
SQL injection. This is usually cause by the programmer not making the program parse incoming text, therefore allowing an attacker to input database commands.
4 0
4 years ago
Other questions:
  • An HP PC does not support the HP System Board Configuration tool, and you must use the HP System Board Replacement and System Di
    7·1 answer
  • Under what key category do page up and page down keys fall?
    15·1 answer
  • 11. In Microsoft Word, when you highlight existing text you want to replace, you're in
    8·1 answer
  • Which outcome is one of the negative consequences of anonymous communication over the Internet? It can lead to regulatory restri
    14·2 answers
  • What is network management?
    12·1 answer
  • A customer has a computer for a home business, but wants to have another computer as a web server. What would be the best soluti
    11·2 answers
  • Write down a pair of integers whose sum is​ 0
    5·1 answer
  • Project: Big Data Programming - Section 2
    11·1 answer
  • You have studied graphic design, advanced math, and programming, and you
    13·1 answer
  • Iris has completed a graphic design project for a client. what should iris obtain from the client in order to display the work i
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!